First published: Fri May 20 2016(Updated: )
Eval injection vulnerability in tftp_api.rb in the TFTP module in the Smart-Proxy in Foreman before 1.10.4 and 1.11.x before 1.11.2 allows remote attackers to execute arbitrary code via the PXE template type portion of the PATH_INFO to tftp/.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Foreman | =1.11.0 | |
Foreman | =1.11.0-rc1 | |
Foreman | =1.11.0-rc2 | |
Foreman | =1.11.0-rc3 | |
Foreman | =1.11.1 | |
Foreman | =1.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3728 is classified as a critical vulnerability due to its potential for remote code execution.
To mitigate CVE-2016-3728, upgrade your Foreman installation to version 1.10.4 or 1.11.2 and later.
CVE-2016-3728 impacts Foreman versions 1.10.0 to 1.10.3 and 1.11.0 to 1.11.1.
CVE-2016-3728 allows remote attackers to execute arbitrary code through an Eval injection vulnerability.
Yes, CVE-2016-3728 can be easily exploited by sending crafted requests targeting the TFTP module.